comp.lang.ada
 help / color / mirror / Atom feed
From: Alan Jump <alan.jump@gmail.com>
Subject: Re: library/binding for sftp?
Date: Thu, 8 Aug 2013 13:03:59 -0700 (PDT)
Date: 2013-08-08T13:03:59-07:00	[thread overview]
Message-ID: <2d28eb38-0cbc-4f43-983c-d11318614491@googlegroups.com> (raw)
In-Reply-To: <ku0qti$6nr$1@loke.gir.dk>

On Thursday, August 8, 2013 12:18:09 PM UTC-7, Randy Brukardt wrote:
> Everything I read about security says that there is "no practical defense 
> against a determined attacker". That's a bit more nuanced than Dmitry's 
> statement, but it's repeated all of the time by the security experts I read. 
> You might be able to stop such an attack by unplugging all of your internet 
> connections and shutting down all of your computers, but even that isn't 
> certain. And who can do that for long?

You're close. The only truly secure computer is one that has NEVER had power applied to it. But since that fairly effectively eliminates the usefulness of a computer as anything except a really expensive doorstop, the best we can do is minimize the risks, since it's become impossible to completely eliminate them.

> And Dmitry's point about spies (like the NSA) using "known protocols" is 
> certainly true. They are much less likely to generally monitor what they 
> don't know about. Of course, if they are targetting you directly, see 
> statement 1.

I have nothing to fear from the NSA. What I fear in doing any sort of contract work is industrial espionage, which is a much more common occurrence, especially if one is on contract with a multinational (which, thank Ghu, I am not). 

> Honestly, your attitude is dangerously naive. Probably the best strategy of 
> all is to have no secrets that need protecting, as in today's environment 
> you should assume all information is being read (or could be read) by 
> someone.

Having no secrets to conceal is very close to being as impossible as concealing every secret one has indefinitely.

> When RRS was doing business with the NSA back in the 1980s, we used to 
> occassionally talk to the light fixtures to remind ourselves of the 
> possibility of survialence. We thought it was reasonably likely that we were 
> spied upon even then, and it's 100 times easier today (we didn't have a 
> network - we used sneaker-net - and weren't connected to any public network 
> until we started working on Ada 9x).

As stated before, the best one can hope for in this so-called "modern" era is to minimize the risks, and part of that is minimizing the damage which can be done by compromised data, be it at rest or in motion. I'd much prefer to place a certain level of trust into peer-reviewed, thoroughly-tested algorithms than in an internally-developed process of unknown and untried effectiveness. I say "unknown and untried" because internally-developed security processes seldom, if ever, are revealed to the computing public at large as having been compromised...they simply quietly go away, and may or may not appear in security textbooks a few years later as examples of what not to do.

Just my 2p worth.

 - -
73 de N5ILN
Alan

  reply	other threads:[~2013-08-08 20:03 UTC|newest]

Thread overview: 39+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-08-05 12:41 library/binding for sftp? Stephen Leake
2013-08-05 15:18 ` Dmitry A. Kazakov
2013-08-06  6:24   ` Stephen Leake
2013-08-06  6:54     ` Dmitry A. Kazakov
2013-08-07 10:06       ` Stephen Leake
2013-08-07 13:04         ` Dmitry A. Kazakov
2013-08-07 17:15           ` Simon Clubley
2013-08-07 19:57             ` Dmitry A. Kazakov
2013-08-07 20:09               ` Alan Jump
2013-08-07 20:26                 ` Dmitry A. Kazakov
2013-08-07 20:32                   ` Alan Jump
2013-08-08  9:14                     ` Björn Persson
2013-08-08  9:49                       ` Dmitry A. Kazakov
2013-08-08 11:37                         ` Björn Persson
2013-08-08 19:18                           ` Randy Brukardt
2013-08-08 20:03                             ` Alan Jump [this message]
2013-08-09  9:19                               ` Björn Persson
2013-08-09 20:21                               ` Randy Brukardt
2013-08-09  8:49                             ` Björn Persson
2013-08-09 20:12                               ` Randy Brukardt
2013-08-19 17:26                                 ` Stefan.Lucks
2013-08-19 18:15                                   ` AdaMagica
2013-08-19 22:45                                   ` Randy Brukardt
2013-08-19 23:15                                   ` Randy Brukardt
2013-08-20  6:43                                     ` Georg Bauhaus
2013-09-13  9:58                                       ` Oliver Kleinke
2013-09-13 21:12                                         ` Georg Bauhaus
2013-08-20  8:14                                     ` Stefan.Lucks
2013-08-20 20:59                                       ` Randy Brukardt
2013-08-21  7:27                                         ` Stefan.Lucks
2013-08-21 16:46                                           ` Alan Jump
2013-08-22  5:53                                             ` Per Sandberg
2013-08-26 21:21                                           ` Randy Brukardt
2013-08-24  8:06                                       ` David Thompson
2013-08-24 11:26                                         ` Stefan.Lucks
2013-08-07 21:46               ` Dennis Lee Bieber
2013-08-07 17:44           ` Björn Persson
2013-08-05 18:40 ` Jeffrey Carter
2013-08-06  6:26   ` Stephen Leake
replies disabled

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox